Preferred Language
Articles
/
1RZAmYcBVTCNdQwC9Vdv
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 17 2026
Journal Name
Journal Of Physical Education
A Safe Environment Scale from Professional Basketball Players and Coaches’ Point Of View
...Show More Authors

The aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2024
Journal Name
Baghdad Science Journal
Spectrophotometric determination of 4-ethylphenol using cloud point extraction in different water samples
...Show More Authors

تصف هذه الدراسة تطوير تقنية سهلة ورخيصة ودقيقة وسريعة لقياس 4-اثيل فينول وتنطوي الطريقة الأولية على تحويل -3 نيترو انيلين إلى ملح ديازونيوم ثم التفاعل مع 4 - إثيل فينول في وسط قلوي.المعقد المتكون هو أصفر اللون وله امتصاص عند اعلى طول موجي عند 426 nm. ويتبع قانون بير في مدى خطي قدره 5-12 μg mL-1 مع معامل ارتباط قدره 0.994 وامتصاص مولاري 6.0024x10^3  L.mol-1.cm-1  وتم استُخدِام تقنية نقطة السحابة لقياس كميات قليلة جدا من الفينول باس

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Point of Care testing: The future of periodontal dis-ease diagnosis and monitoring
...Show More Authors

Manual probing and periodontal charting are the gold standard for periodontal diagnosis that have been used in practice over a century. These methods are affordable and reliable but they are associated with some drawbacks that cannot be avoided. Among these issues is their reliance on operator’s skills, time-consuming and tedious procedure, lack sensitivity especially in cases of early bone loss, and causing discomfort to the patient. Availability of a wide range of biomarkers in the oral biofluids, dental biofilm, and tissues that potentially reflect the periodontal health and disease accurately encouraged their use as predictive/diagnostic/monitoring tools. Analysing biomarkers during care-giving to the patient using chairside kits i

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Real Time Wireless Monitoring and Controlling of 3-D Single Point Incremental Tool
...Show More Authors

Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Professional competencies and teaching university professor from the point of view of students
...Show More Authors

Targeted Search:

-scale preparation of teaching and professional competencies required for university professor from the perspective of students from different disciplines.

-scale application prepared by the researcher for the students to see how their preference for these competencies to their professors.

-limited Search: Find determined to present the following

-students of both sexes in the University of Baghdad.

2013 -      2012

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
جامعة كرميان
The effect of a training program for chemistry teachers based on the strategy of both sides of the brain together on the thinking patterns of their students
...Show More Authors

Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
2018 9th International Conference On Information And Communication Systems (icics)
An intersection-based segment aware algorithm for geographic routing in VANETs
...Show More Authors

In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
2019 11th Computer Science And Electronic Engineering (ceec)
ANN based Measurement for No-Reference Video Quality of Experience Metric
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Indoor/Outdoor Deep Learning Based Image Classification for Object Recognition Applications
...Show More Authors

With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref